2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS) 2016
DOI: 10.1109/icaccs.2016.7586400
|View full text |Cite
|
Sign up to set email alerts
|

A survey on node discovery in Mobile Internet of Things(IoT) scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Resource discovery could be limited by a time interval in the processing of data for disaster monitoring [34]. Furthermore, to support loT application to provide rich ubiquitous connectivity, the elements of '6A' connectivity are required (Anytime, Anyplace, Any service, Anything, Anyone, and Any path) [35].…”
Section: Resources Dsicovery For Iiotmentioning
confidence: 99%
See 3 more Smart Citations
“…Resource discovery could be limited by a time interval in the processing of data for disaster monitoring [34]. Furthermore, to support loT application to provide rich ubiquitous connectivity, the elements of '6A' connectivity are required (Anytime, Anyplace, Any service, Anything, Anyone, and Any path) [35].…”
Section: Resources Dsicovery For Iiotmentioning
confidence: 99%
“…In the meantime, in [35] researcher in the resource management field said, resource discovery within the mobile IoT network can be classified into different scenarios as follows:…”
Section: Resources Dsicovery For Iiotmentioning
confidence: 99%
See 2 more Smart Citations
“…The same tasks are also applicable for data transmission between the three layers—from the end devices to the remote server or cloud. Various popular solutions to node discovery in IoT include time synchronized protocols (e.g., recursive binary tree partitioning, wakeup scheduling), deterministic approaches (e.g., Searchlight), probabilistic approaches (e.g.,Bloom filters [Dautov, Distefano, Senko, & Surnin, ]), colocation‐based approaches (e.g., randomized discovery, context‐aware power management discovery), fully distributed opportunistic approaches (e.g., efficient application‐layer discovery protocol), and learning‐based approaches (e.g., Q‐learning) (Valarmathi, Sumathi, & Deepika, ).…”
Section: Knowledge Discovery For Iotmentioning
confidence: 99%